Big Data

Author(s):  
P. Lalitha Surya Kumari

This chapter gives information about the most important aspects in how computing infrastructures should be configured and intelligently managed to fulfill the most notably security aspects required by big data applications. Big data is one area where we can store, extract, and process a large amount of data. All these data are very often unstructured. Using big data, security functions are required to work over the heterogeneous composition of diverse hardware, operating systems, and network domains. A clearly defined security boundary like firewalls and demilitarized zones (DMZs), conventional security solutions, are not effective for big data as it expands with the help of public clouds. This chapter discusses the different concepts like characteristics, risks, life cycle, and data collection of big data, map reduce components, issues and challenges in big data, cloud secure alliance, approaches to solve security issues, introduction of cybercrime, YARN, and Hadoop components.

Author(s):  
Navin Jambhekar ◽  
Chitra Anil Dhawale

Information security is a prime goal for every individual and organization. The travelling from client to cloud server can be prone to security issues. The big data storages are available through cloud computing system to facilitate mobile client. The information security can be provided to mobile client and cloud technology with the help of integrated parallel and distributed encryption and decryption mechanism. The traditional technologies include the plaintext stored across cloud and can be prone to security issues. The solution provided by applying the encrypted data upload and encrypted search. The clouds can work in collaboration; therefore, the encryption can also be done in collaboration. Some part of encryption handle by client and other part handled by cloud system. This chapter presents the security scenario of different security algorithms and the concept of mobile and cloud computing. This chapter precisely defines the security features of existing cloud and big data system and provides the new framework that helps to improve the data security over cloud computing and big data security system.


Author(s):  
Karthiga Shankar ◽  
Suganya R.

Consumers are spending more and more time on the web to search information and receive e-services. E-commerce, e-government, e-business, e-learning, e-science, etc. reflect the growing importance of the web in all aspects of our lives. Along with the tremendous growth of online information, the use of big data has become a vital force in growing revenues. Consumers are today shopping multiple products across multiple channels online. This transformation is substantial and many of the e-commerce companies have now turned to big data analytics for focused customer group targeting using opinion mining for evaluating campaign strategies and maintaining a competitive advantage, especially during the festive shopping season. So, the role of intelligent techniques in e-servicing is massive. This chapter focuses on the importance of big data (since there is a large volume of data online) and big data analytics in the field of e-servicing and explains the various applications, platforms to implement the big data applications, and security issues in the era of big data and e-servicing.


2022 ◽  
pp. 1634-1644
Author(s):  
Karthiga Shankar ◽  
Suganya R.

Consumers are spending more and more time on the web to search information and receive e-services. E-commerce, e-government, e-business, e-learning, e-science, etc. reflect the growing importance of the web in all aspects of our lives. Along with the tremendous growth of online information, the use of big data has become a vital force in growing revenues. Consumers are today shopping multiple products across multiple channels online. This transformation is substantial and many of the e-commerce companies have now turned to big data analytics for focused customer group targeting using opinion mining for evaluating campaign strategies and maintaining a competitive advantage, especially during the festive shopping season. So, the role of intelligent techniques in e-servicing is massive. This chapter focuses on the importance of big data (since there is a large volume of data online) and big data analytics in the field of e-servicing and explains the various applications, platforms to implement the big data applications, and security issues in the era of big data and e-servicing.


Author(s):  
Niranjan K. Ray ◽  
Biswaranjan Acharya ◽  
Anil Kumar Swain

2021 ◽  
Vol 15 (2) ◽  
pp. 28-36
Author(s):  
Shahab KAREEM ◽  
Aesha HASAN ◽  
Roojwan HAWEZI ◽  
Karwan MUHEDEN ◽  
Farah KHOSHABA

2018 ◽  
Vol 7 (3.6) ◽  
pp. 234 ◽  
Author(s):  
N Sirisha ◽  
K V.D. Kiran

Big Data has become more popular, as it can provide on-demand, reliable and flexible services to users such as storage and its processing. The data security has become a major issue in the Big data. The open source HDFS software is used to store huge amount of data with high throughput and fault tolerance and Map Reduce is used for its computations and processing. However, it is a significant target in the Hadoop system, security model was not designed and became the major drawback of Hadoop software. In terms of storage, meta data security, sensitive data  and also the data security will be an serious issue in HDFS. With the importance of Hadoop in today's enterprises, there is also an increasing trend in providing a high security features in enterprises. Over recent years, only some level of security in Hadoop such as Kerberos and Transparent Data Encryption(TDE),Encryption techniques, hash techniques are shown for Hadoop. This paper, shows the efforts that are made to present Hadoop Authorization security issues using Apache Sentry in HDFS. 


Sign in / Sign up

Export Citation Format

Share Document